Category Archive

AT&T is getting some pushback for what most industry insiders are calling a misleading indicator. It has started to appear on many new smartphones including both Androids and iPhones. With the latest update, a growing number of customers are now seeing a “5G E” indicator on their 4G phones, which leads to a momentary surge of excitement, leading customers to …

One of the unfortunate truths about apps is that many developers use deceptive practices to try and confuse consumers. They try to mislead them about how much custom features cost and when in-app purchases occur. Many attempt to hide or obfuscate the particulars of subscription details. The thinking here is pretty simple: First of all, a customer might not notice …

In the world of hacking, steganography ranks as one of the most difficult methodologies to detect. If you’re not familiar with the term, it is the practice of embedding executable code inside images, which makes it virtually impossible to detect. The reason is simple: Virus scanners are built around the idea of searching for text strings with identifiable malicious characteristics …

Apple’s latest iOS release contained a feature that wowed and excited its massive user base. Group FaceTime. It was heralded as ‘the next Big Thing’ in the Apple ecosystem. Unfortunately, there are problems, and the company has been forced to temporarily disable the feature while they wrestle with a major security flaw. A bug in the code allows anyone to …

There’s a new side channel attack to worry about. This one is after the target system’s OS page cache, where a variety of sensitive data that has been accessed by the device’s owner is stored for rapid retrieval. Perhaps the worst and most ominous aspect of this newly identified threat is the fact that it’s not limited by hardware architecture, …

There’s a new, widespread phishing campaign underway that you need to be aware of if you use the Apple App store at all. At this time, no one knows who’s behind the campaign, but already, a surprising number of people have been taken in by it. The campaign works like this: You’ll receive an email that appears to be from …

There’s a new malware threat in the MacOS ecosystem called OSX.LamePyre. If you haven’t heard of it yet, it belongs on your radar. At the moment, industry experts agree that it’s more of a crude work in progress. Unfortunately, the danger of crude works in progress is that the hackers continue to develop them, making them a threat that gets …

Apple doesn’t tend to share well with other corporations, but they have made a few efforts to expand their services to the platforms of their competitors. You can, for instance, download Apple Music onto an Android device or on Sonos Speakers. Soon, you’ll be able to access Apple Music on your Amazon Echo. The rollout is slated to begin the …

If you own an iPhone X and have been experiencing problems with the touch responsiveness of your display, you’re not alone. Apple has acknowledged that faulty components in an unspecified number of iPhone X’s may cause the display module to fail. In response, they’ve launched a new program to replace affected screens for free. If you’ve been experiencing any issues …

In recent months, hackers around the world have been finding new ways to invade people’s privacy, hijacking an increasing number of cameras and microphones attached to smartphones and PCs. Apple is responding to the evolving threat by introducing a new layer of physical security to their latest MacBooks. The company has created a custom security chip which introduces a means …

The whole I.T. Solutions team really made an effort to make sure I had my machines up and running by my strict deadline and went through some tedious tasks to get there! Thanks for working around my schedule to get where we needed to be.